Role in IT decision-making process:Align Business & IT GoalsCreate IT StrategyDetermine IT NeedsManage Vendor RelationshipsEvaluate/Specify Brands or VendorsOther RoleAuthorize PurchasesNot Involved

Work Phone:

Company:

Company Size:

Industry:

Street Address

City:

Zip/postal code

State/Province:

Country:

Occasionally, we send subscribers special offers from select partners. Would you like to receive these special partner offers via e-mail?YesNo

Your registration with Eweek will include the following free email newsletter(s):News & Views

By submitting your wireless number, you agree that eWEEK, its related properties, and vendor partners providing content you view may contact you using contact center technology. Your consent is not required to view content or use site features.

By clicking on the "Register" button below, I agree that I have carefully read the Terms of Service and the Privacy Policy and I agree to be legally bound by all such terms.

Apple Computer's recent out-of-court settlement with a former employee who leaked details of its forthcoming hardware to the Web started me thinking again about a topic that's as old as the Mac itself: When does Apple's legendary veil of secrecy begin to

Late July and early August are the dog days of the Mac social calendar. But even if Apple eschews any out-of-category press conferences in the interim, there's still plenty of Mac news to chase out there.

Microsoft scored some big public relations points with its open desktop announcement earlier this month, but I still can't get over how deftly the company managed to deflect attack in its newfound ability to separate the Internet Explorer browser from its